Search:

Type: Posts; User: anomie; Keyword(s):

Page 1 of 7 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    13
    Views
    1,123

    [ubuntu] Re: How secure can a website REALLY be?

    Cloud storage potentially spans across many different backend servers, none of which are physically secured by you. Unless your data is encrypted by a key the end user (somehow) safely provides,...
  2. Replies
    7
    Views
    1,202

    [all variants] Re: Second SSH terminal

    Both tmux and GNU screen (running on the remote host) can solve this problem. What they'll allow you to do is hop between an arbitrary number of logical "terminals".

    Try a 'net search for...
  3. Replies
    13
    Views
    1,123

    [ubuntu] Re: How secure can a website REALLY be?

    Of course not. There is an illuminating text on this topic that I highly recommend to any Apache http server administrator:

    Apache Security, by Ivan Ristic

    If you are serious about...
  4. Replies
    7
    Views
    492

    [SOLVED] Re: Question about public/private keys

    I think you're confusing host authentication / identification keys with user authentication keys.

    The former is what your ssh client is chattering about when you connect to an unrecognized...
  5. Thread: openssl

    by anomie
    Replies
    8
    Views
    751

    [ubuntu] Re: openssl

    A few things:

    When you post a request for help, please include (from the beginning of the thread) exactly what you have tried, and the exact error message you're seeing. Do not leave parts of...
  6. Thread: openssl

    by anomie
    Replies
    8
    Views
    751

    [ubuntu] Re: openssl

    So, per your own research (which I'm not necessarily vouching for :)), what does this show you:


    $ ls -l /dev/*rand*

    (And for more complete information on this thread, which Ubuntu version is...
  7. Thread: openssl

    by anomie
    Replies
    8
    Views
    751

    [ubuntu] Re: openssl

    What is the exact command you're running (which generates that error)?
  8. Replies
    6
    Views
    2,833

    [ubuntu] Re: SSH Brute Force Attack?

    I don't follow what a "brute force attack" has to do with this thread.

    Do you have access to any of the logs through the web interface? It may be that 1) root's password entry is locked; or 2)...
  9. Thread: gpg proxy

    by anomie
    Replies
    4
    Views
    1,226

    [all variants] Re: gpg proxy

    I'm not sure. But it may be that I am not understanding your idea:

    If your goal is client authentication (i.e. the client is going to sign a random string from the server), how will public key...
  10. Replies
    7
    Views
    935

    [all variants] Re: Random password generators?

    At a glance, not sure whether one is a port of the other (or whether they're unrelated), but there's of course pwgen for GNU/Linux:

    http://sourceforge.net/projects/pwgen/
  11. Thread: gpg proxy

    by anomie
    Replies
    4
    Views
    1,226

    [all variants] Re: gpg proxy

    If your goal is to authenticate a user (or users) by way of cryptographic keys, try searching the 'net for "ssl client authentication".
  12. Replies
    5
    Views
    1,345

    [ubuntu] Re: SSH pubkey authentication and MITM attacks

    Yes. OpenSSH helps thwart MITM attacks after your client has saved the server's key ID (in ~/.ssh/known_hosts, as mentioned).



    Definitely not. If someone cracks foo.local, and poisons .local...
  13. Replies
    4
    Views
    402

    [SOLVED] Re: Mysterious outbound connection

    I'm not familiar with firestarter, but I'd suggesting "restarting it" if possible. For whatever reason, it (really, iptables) may be tracking state on a connection that is long gone.
  14. Replies
    4
    Views
    402

    [SOLVED] Re: Mysterious outbound connection

    Let's see output from:

    $ sudo netstat -tnp

    Perhaps it's just in FIN_WAIT, and taking a very long time to close (following your p2p activity).
  15. Replies
    2
    Views
    706

    [kubuntu] Re: I'm in permission hell with LAMP...

    Are you using open_basedir in /etc/php.ini?

    Also, you might want to test creating log.txt using an absolute path instead (to make sure it's really being created where you think it is).
  16. Replies
    18
    Views
    1,257

    [ubuntu] Re: How much security does mac filtering provide?

    No.

    Use WPA2-PSK with a strong key. That's about the best you'll be able to do with minimal effort + a typical home router/access point.
  17. [SOLVED] Re: Automatical updates and script for AIDE, Chkrootkit, and ClamAV

    You seem eager to learn about scripting, so here is a very good starting point (for bash):
    http://www.tldp.org/LDP/abs/html/

    Of course you can run those programs non-interactively in a cronjob. ...
  18. Replies
    29
    Views
    1,914

    [ubuntu] Re: Who's watching the keepers, or "is it safe?"

    Possibly he was referring to this incident:

    http://www.theregister.co.uk/2008/05/16/debian_openssl_flaw/
    http://blogs.computerworld.com/fixing_debian_openssl


    Even if he wasn't, it's...
  19. Thread: ipp open

    by anomie
    Replies
    2
    Views
    3,050

    [ubuntu] Re: ipp open

    Running nmap against localhost is not particularly useful. More enlightening output can be had from:
    # netstat -ltnp

    (i.e. Show only listening tcp ports, don't resolve IPs/port assignments, and...
  20. Replies
    36
    Views
    8,218

    [all variants] Re: My IP is being spoofed, help please?

    Allow me to apply Occam's Razor here and throw out a couple alternative possibilities:

    Idea one - you have a process holding open a connection for your download application (easy to verify with...
  21. Replies
    12
    Views
    4,760

    [kubuntu] Re: How to remain 'hidden' on a network

    I'm not an 802.11 expert, but I find it very unlikely that you're going to be able to hide your interface's layer 2 traffic (as that would logically interfere with normal communication).

    Two...
  22. Replies
    7
    Views
    1,364

    [ubuntu] Re: Password/Encryption Keys Questions

    The dumb*** is the guy who won't even ask the question and/or refuses to learn.
  23. Replies
    29
    Views
    1,914

    [ubuntu] Re: Who's watching the keepers, or "is it safe?"

    I would go so far as to say that if you haven't personally reviewed (and understood) every line of source code, you can't be 100% sure that something nasty is not happening under the covers. Even if...
  24. Replies
    14
    Views
    16,301

    [ubuntu] Re: Encrypt / Decrypt MD5 hash

    Recommended reading: http://en.wikipedia.org/wiki/Cryptographic_hash_function

    The best you can do is brute force it. (Actually that's not exactly true, but if you have to ask this question my...
  25. Replies
    3
    Views
    615

    [all variants] Re: Hole in Linux kernel provides root rights

    If you're using an affected kernel, and can't / won't update at this time, at least employ the workaround the article mentions.


    # echo "alias net-pf-21 off" > /etc/modprobe.d/disable-rds
Results 1 to 25 of 156
Page 1 of 7 1 2 3 4